“…Moreover, Zheng and Hu [2] proposed a cryptanalysis lattice-based construction attack on prime power RSA modulus N = p r q for r ≥ 2 with two decryption exponents where they have shown that N is insecure when δ 1 δ 2 < N ( r−1 r+1 ) 3 where d 1 < N δ 1 and d 2 < N δ 2 . By assuming δ 1 = δ 2 = δ , [2] made comparisons with previous results of [1,4] when r ≥ 4. In this paper, we employ a similar approach to [2] using lattice-based approach except that we utilize three pairs of public and private exponents (e 1 , d 1 ), (e 2 , d 2 ), and (e 3 , d 3 ) of RSA variant N = p r q for r ≥ 2 with three decryption exponents sharing common modulus N, and prove that the security of prime power moduli N can be broken and prime factors p and q can be factored in polynomial-time.…”